- From: Ian Hickson via cvs-syncmail <cvsmail@w3.org>
- Date: Tue, 03 Nov 2009 23:01:03 +0000
- To: public-html-commits@w3.org
Update of /sources/public/html5/webstorage In directory hutz:/tmp/cvs-serv9799 Modified Files: Overview.html Log Message: Remove Web Database from the WHATWG complete spec; say that sqlite is the expected language; update the character references to the latest set. (whatwg r4374) Index: Overview.html =================================================================== RCS file: /sources/public/html5/webstorage/Overview.html,v retrieving revision 1.93 retrieving revision 1.94 diff -u -d -r1.93 -r1.94 --- Overview.html 27 Oct 2009 19:47:09 -0000 1.93 +++ Overview.html 3 Nov 2009 23:01:01 -0000 1.94 @@ -599,7 +599,6 @@ executing, other than in a way that is predictable by the script itself.<h2 id="disk-space"><span class="secno">5 </span>Disk space</h2><p>User agents should limit the total amount of space allowed for - storage areas. <p>User agents should guard against sites storing data under the origins other affiliated sites, e.g. storing up to the limit in @@ -674,7 +673,6 @@ <p>If users attempt to protect their privacy by clearing cookies without also clearing data stored in the - local storage area, sites can defeat those attempts by using the two features as redundant backup for each other. User agents should present the @@ -748,12 +746,10 @@ SSL can be sure that only pages using SSL that have certificates identifying them as being from the same domain can access their - storage areas. <h3 id="cross-directory-attacks"><span class="secno">7.2 </span>Cross-directory attacks</h3><p>Different authors sharing one host name, for example users hosting content on <code>geocities.com</code>, all share one - local storage object. There is no feature to restrict the access by pathname. Authors on shared hosts are therefore recommended to avoid using these
Received on Tuesday, 3 November 2009 23:01:12 UTC